Abstract
We have sketched the technical architecture of e-postage systems. They are just another kind of largely distributed system comparable to flight reservation systems, or electronic banking systems. The security risks related to these servers and networks can be analyzed by standard computer security measures and tools. Lots of advice is available for comparing security measures like firewalls, intrusion detection systems, virus scanners, and so forth [93,93]. All of this must be carefully planned, installed, and reviewed and maintained on a regular basis, but it is hardly if at all specific to e-postage systems. What is highly specific to e-postage systems is their cryptographic security design. Thus, we introduce in this chapter the general security architectures of offline and online e-postage systems before we take a closer look at industry examples of e-postage systems in the following chapter.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
Rights and permissions
Copyright information
© 2007 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
(2007). General Security Architecture. In: Electronic Postage Systems. Advances in Information Security, vol 26. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-44606-6_5
Download citation
DOI: https://doi.org/10.1007/978-0-387-44606-6_5
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-29313-4
Online ISBN: 978-0-387-44606-6
eBook Packages: Computer ScienceComputer Science (R0)
